US20070086448A1 - Integrated pseudo-wire and virtual routing and forwarding on a single provider edge router - Google Patents

Integrated pseudo-wire and virtual routing and forwarding on a single provider edge router Download PDF

Info

Publication number
US20070086448A1
US20070086448A1 US11/252,098 US25209805A US2007086448A1 US 20070086448 A1 US20070086448 A1 US 20070086448A1 US 25209805 A US25209805 A US 25209805A US 2007086448 A1 US2007086448 A1 US 2007086448A1
Authority
US
United States
Prior art keywords
packet
frame
router
vpn
vrf
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/252,098
Inventor
Cheng-Hong Hu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Intellectual Property I LP
Original Assignee
SBC Knowledge Ventures LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SBC Knowledge Ventures LP filed Critical SBC Knowledge Ventures LP
Priority to US11/252,098 priority Critical patent/US20070086448A1/en
Assigned to SBC KNOWLEDGE VENTURES, L.P. reassignment SBC KNOWLEDGE VENTURES, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HU, CHENG-HONG
Publication of US20070086448A1 publication Critical patent/US20070086448A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/50Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/60Router architectures

Definitions

  • the present disclosure relates generally to provider edge (PE) routers, and more specifically to an integrated pseudo-wire and virtual routing and forwarding on a single provider edge router.
  • PE provider edge
  • L2 legacy layer 2
  • ATM/FR Asynchronous Transfer Mode Frame Relay
  • L3 layer 3
  • IP Internet Protocol
  • VPN Virtual Private Networks
  • MPLS Multi-Protocol Label Switching
  • FIGS. 1 and 2 illustrate prior art systems for transporting L2 traffic over an L3 backbone network.
  • a VPN customer coupled to, for example, Customer Edge router 1 (CE 1 ) can access IP/VPN services through an L2 access network employing, for example, ATM/FR switching technology.
  • Provider Edge router 1 (PE 1 ) establishes pseudo wires (i.e., L2 traffic over an L3 transport) with the L2 access network.
  • This traffic is intercepted by PE 2 , which provides L3 services in an IP/VPN network coupled to other CE routers.
  • PEs 1 and 2 are interconnected by way of a physical coupling, which can be susceptible to a single-point failure that can render end-to-end communications inoperable.
  • the prior art system of FIG. 2 makes an improvement over the prior art system of FIG. 1 by integrating PE 1 and PE 2 routers into a single unit, thereby reducing cost.
  • This integrated unit has a pseudo-wire (PW) element coupled by an external physical connection to a Virtual Routing and Forwarding (VRF) element that connects to a customer's VPN network.
  • the PW element creates pseudo-wire connections with the L2 access network, and transports traffic therefrom through the VRF element, which in turn reformats the traffic for transport in an IP/VPN network.
  • the physical coupling between the PW and VRF elements is on the same PE router.
  • the solution of FIG. 2 thus reduces the equipment cost by nearly half of the prior art system of FIG. 1 , and helps to minimize the single point failure described earlier. However, two extra L2 ports are required to connect L2 and L3 functions together on the same PE router.
  • FIGS. 1-2 are block diagrams of prior art pseudo-wire provider edge (PE) routers
  • FIG. 3 is block diagram of a Pseudo-Wire to IP Virtual Private Network Provider Edge (PW-IP/VPN PE) router integrating teachings of the present disclosure
  • FIG. 4 depicts a flowchart of a method operating in the PW-IP/VPN PE router integrating teachings of the present disclosure
  • FIG. 5 is a diagrammatic representation of a machine in the form of a computer system within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies discussed herein.
  • FIG. 3 is block diagram of a Pseudo-Wire to IP Virtual Private Network Provider Edge (PW-IP/VPN PE) router 300 integrating teachings of the present disclosure.
  • the PW-IP/VPN PE router 300 comprises a pseudo-wire (PW) element 302 and a Virtual Routing and Forwarding (VRF) element 304 integrally coupled to each other by way of a virtual circuit.
  • the PW-IP/VPN PE router 300 further comprises a controller 306 for controlling operations of the PW element 302 and VRF element 304 .
  • the PW-IP/VPN PE router 300 has a housing assembly 301 for carrying the aforementioned components.
  • the virtual circuit between PW element 302 and the VRF element 304 can be an unexposed physical connection such as a dedicated signal bus, an unexposed logical connection such as software processes operating between the PW and VRF elements, or combinations thereof.
  • the PW element 302 utilizes common technology for processing packet streams exchanged on a pseudo-wire.
  • a pseudo-wire is an emulation of a native service over a Packet Switched Network (PSN).
  • the native service may be ATM, Frame Relay, Ethernet, low-rate TDM (Time Division Multiplexing), or SONET SDH (Synchronous Digital Hierarchy), while the PSN may be MPLS, or IP (either IPv4 or IPv6).
  • the VRF element 304 utilizes common IP/VPN (or MPLS/VPN) technology for transporting traffic on virtual private networks (VPNs).
  • a VPN is a private data network that makes use of the public telecommunication infrastructure, and maintains privacy through the use of a tunneling protocol to separate the customers' networks.
  • the controller 302 comprises computing technology such as a microprocessor, DSP (Digital Signal Processor) and associated mass storage media such as a disk drive, random access memory, flash memory, or other storage devices.
  • the controller 302 can also be represented by a desktop computer, server or other processing device that can perform the operations disclosed herein.
  • the PW-IP/VPN PE router 300 is coupled to customer edge (CE) routers 310 , a conventional an L2 access network 312 , such as an ATM/FR network, and conventional L2-to-L3 PE routers 314 .
  • CE customer edge
  • L2 access network 312 such as an ATM/FR network
  • L2-to-L3 PE routers 314 The function and operation of these components is illustrated in FIG. 4 , which depicts a flowchart of a method 400 operating in the PW-IP/VPN PE router 300 according to the teachings of the present disclosure.
  • Method 400 provides an overview of communications between first and second CE routers 310 each supporting one or more users with terminal equipment (e.g., desktop computer) coupled thereto.
  • Method 400 begins with step 401 where L3 packet traffic at terminal equipment of a customer is generated.
  • This traffic can be as simple as a file transfer or more sophisticated functions such as video and/or voice over IP traffic.
  • This traffic is generally destined for terminal equipment of another customer.
  • a first CE router 310 intercepts the traffic generated in step 401 , and generates by conventional means a frame with an embedded L3 packet carrying a portion of said traffic.
  • a frame is a packet defined by the second layer of the well-known OSI (Open Systems Interconnection) model.
  • An L3 packet can be a packet that complies with standards such as the Multi-Protocol Label Switching (MPLS) or the Internet Protocol (IP). For illustration purposes only, the L3 packets will be referred to from hereon as IP packets.
  • MPLS Multi-Protocol Label Switching
  • IP Internet Protocol
  • the first CE router 310 transmits the frame in the L2 access network 312 , which in turn relays the frame to a select one of the conventional L2-L3 PE routers 314 .
  • the L2-L3 PE router 314 in step 406 receives the frame and embeds the frame in an IP packet.
  • the IP packet is intercepted by the PW element 302 of the PW-IP/VPN PE router 300 .
  • the PW element 302 retrieves in step 408 the frame from the IP packet, and transmits it in step 410 to the VRF element 304 .
  • the transmission step can be accomplished in step 409 by enabling a virtual circuit such as a physical and/or logical interface that interconnects the PW element 302 and the VRF element 304 (e.g., a physical signal bus and/or software bus).
  • a virtual circuit such as a physical and/or logical interface that interconnects the PW element 302 and the VRF element 304 (e.g., a physical signal bus and/or software bus).
  • the housing assembly 301 of the PW-VRF PE router 300 protects exchanges between the PW element 302 and the VRF element 304 from physical or other impairments (such as cross-talk), thus making it improbable that a single-point of failure such as described in the prior art systems of FIGS. 1 and 2 will occur.
  • Said housing assembly 301 also eliminates the need for two extra L2 ports to connect L2 and L3 functions together as shown in the prior art system FIG. 2 .
  • the VRF element 412 retrieves the embedded IP packet from the frame.
  • the VRF element 304 in step 414 embeds the retrieved IP packet in a new frame, which it transmits in step 416 to the second CE router 310 .
  • the CE router 310 in step 418 retrieves the embedded IP packet from the new frame, and transmits it to terminal equipment of a targeted customer coupled to the second CE router 310 .
  • the IP packet is processed at the terminal equipment of the said customer.
  • steps 401 through 419 can be repeated for transporting packet traffic between customers. Additionally, said steps can be used for engaging in bidirectional communications in an IP/VPN connection or MPLS/VPN connection between customers coupled to the CE routers 310 .
  • FIG. 5 is a diagrammatic representation of a machine in the form of a computer system 500 within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies discussed above.
  • the machine operates as a standalone device.
  • the machine may be connected (e.g., using a network) to other machines.
  • the machine may operate in the capacity of a server or a client user machine in server-client user network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
  • the machine may comprise a server computer, a client user computer, a personal computer (PC), a tablet PC, a laptop computer, a desktop computer, a control system, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
  • a device of the present disclosure includes broadly any electronic device that provides voice, video or data communication.
  • the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
  • the computer system 500 may include a processor 502 (e.g., a central processing unit (CPU), a graphics processing unit (GPU, or both), a main memory 504 and a static memory 506 , which communicate with each other via a bus 508 .
  • the computer system 500 may further include a video display unit 510 (e.g., a liquid crystal display (LCD), a flat panel, a solid state display, or a cathode ray tube (CRT)).
  • the computer system 500 may include an input device 512 (e.g., a keyboard), a cursor control device 514 (e.g., a mouse), a disk drive unit 516 , a signal generation device 518 (e.g., a speaker or remote control) and a network interface device 520 .
  • an input device 512 e.g., a keyboard
  • a cursor control device 514 e.g., a mouse
  • a disk drive unit 516 e.g., a disk drive unit 516
  • a signal generation device 518 e.g., a speaker or remote control
  • the disk drive unit 516 may include a machine-readable medium 522 on which is stored one or more sets of instructions (e.g., software 524 ) embodying any one or more of the methodologies or functions described herein, including those methods illustrated in herein above.
  • the instructions 524 may also reside, completely or at least partially, within the main memory 504 , the static memory 506 , and/or within the processor 502 during execution thereof by the computer system 500 .
  • the main memory 504 and the processor 502 also may constitute machine-readable media.
  • Dedicated hardware implementations including, but not limited to, application specific integrated circuits, programmable logic arrays and other hardware devices can likewise be constructed to implement the methods described herein.
  • Applications that may include the apparatus and systems of various embodiments broadly include a variety of electronic and computer systems. Some embodiments implement functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit. Thus, the example system is applicable to software, firmware, and hardware implementation
  • the methods described herein are intended for operation as software programs running on a computer processor.
  • software implementations can include, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.
  • the present disclosure contemplates a machine readable medium containing instructions 524 , or that which receives and executes instructions 524 from a propagated signal so that a device connected to a network environment 526 can send or receive voice, video or data, and to communicate over the network 526 using the instructions 524 .
  • the instructions 524 may further be transmitted or received over a network 526 via the network interface device 520 .
  • machine-readable medium 522 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions.
  • the term “machine-readable medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure.
  • machine-readable medium shall accordingly be taken to include, but not be limited to: solid-state memories such as a memory card or other package that houses one or more read-only (non-volatile) memories, random access memories, or other re-writable (volatile) memories; magneto-optical or optical medium such as a disk or tape; and carrier wave signals such as a signal embodying computer instructions in a transmission medium; and/or a digital file attachment to e-mail or other self-contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium. Accordingly, the disclosure is considered to include any one or more of a machine-readable medium or a distribution medium, as listed herein and including art-recognized equivalents and successor media, in which the software implementations herein are stored.
  • inventive subject matter may be referred to herein, individually and/or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed.
  • inventive concept merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed.

Abstract

A Pseudo-Wire to Virtual Private Network Provider Edge (PW-VPN PE) router (300) has a pseudo-wire (PW) element (302), a virtual routing and forwarding (VRF) element (304) integrally coupled to the PW element, and a controller (306) for controlling operations of the PW and the VRF elements. The controller is programmed to receive (408-414) a layer 3 (L3) packet comprising a frame and an embedded L3 packet, and transmit (416) to a targeted network element on a virtual circuit a new frame with the embedded L3 packet.

Description

    FIELD OF THE DISCLOSURE
  • The present disclosure relates generally to provider edge (PE) routers, and more specifically to an integrated pseudo-wire and virtual routing and forwarding on a single provider edge router.
  • BACKGROUND
  • It has become common practice for telecommunications service providers to combine legacy layer 2 (L2) networks such as Asynchronous Transfer Mode Frame Relay (ATM/FR) networks with layer 3 (L3) networks such as Internet Protocol (IP)/VPN (Virtual Private Networks) and/or Multi-Protocol Label Switching (MPLS)/VPN networks. To do so, prior art systems have utilized a technique for transporting L2 packet traffic on L3 networks according to a method commonly referred to as pseudo-wire transport.
  • FIGS. 1 and 2 illustrate prior art systems for transporting L2 traffic over an L3 backbone network. In FIG. 1, a VPN customer coupled to, for example, Customer Edge router 1 (CE1) can access IP/VPN services through an L2 access network employing, for example, ATM/FR switching technology. Provider Edge router 1 (PE 1) establishes pseudo wires (i.e., L2 traffic over an L3 transport) with the L2 access network. This traffic is intercepted by PE 2, which provides L3 services in an IP/VPN network coupled to other CE routers. In this prior art system, PEs 1 and 2 are interconnected by way of a physical coupling, which can be susceptible to a single-point failure that can render end-to-end communications inoperable.
  • The prior art system of FIG. 2 makes an improvement over the prior art system of FIG. 1 by integrating PE 1 and PE 2 routers into a single unit, thereby reducing cost. This integrated unit has a pseudo-wire (PW) element coupled by an external physical connection to a Virtual Routing and Forwarding (VRF) element that connects to a customer's VPN network. The PW element creates pseudo-wire connections with the L2 access network, and transports traffic therefrom through the VRF element, which in turn reformats the traffic for transport in an IP/VPN network. The physical coupling between the PW and VRF elements is on the same PE router. The solution of FIG. 2 thus reduces the equipment cost by nearly half of the prior art system of FIG. 1, and helps to minimize the single point failure described earlier. However, two extra L2 ports are required to connect L2 and L3 functions together on the same PE router.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIGS. 1-2 are block diagrams of prior art pseudo-wire provider edge (PE) routers;
  • FIG. 3 is block diagram of a Pseudo-Wire to IP Virtual Private Network Provider Edge (PW-IP/VPN PE) router integrating teachings of the present disclosure;
  • FIG. 4 depicts a flowchart of a method operating in the PW-IP/VPN PE router integrating teachings of the present disclosure; and
  • FIG. 5 is a diagrammatic representation of a machine in the form of a computer system within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies discussed herein.
  • DETAILED DESCRIPTION OF THE DRAWINGS
  • FIG. 3 is block diagram of a Pseudo-Wire to IP Virtual Private Network Provider Edge (PW-IP/VPN PE) router 300 integrating teachings of the present disclosure. The PW-IP/VPN PE router 300 comprises a pseudo-wire (PW) element 302 and a Virtual Routing and Forwarding (VRF) element 304 integrally coupled to each other by way of a virtual circuit. The PW-IP/VPN PE router 300 further comprises a controller 306 for controlling operations of the PW element 302 and VRF element 304. The PW-IP/VPN PE router 300 has a housing assembly 301 for carrying the aforementioned components. The virtual circuit between PW element 302 and the VRF element 304 can be an unexposed physical connection such as a dedicated signal bus, an unexposed logical connection such as software processes operating between the PW and VRF elements, or combinations thereof.
  • The PW element 302 utilizes common technology for processing packet streams exchanged on a pseudo-wire. A pseudo-wire is an emulation of a native service over a Packet Switched Network (PSN). The native service may be ATM, Frame Relay, Ethernet, low-rate TDM (Time Division Multiplexing), or SONET SDH (Synchronous Digital Hierarchy), while the PSN may be MPLS, or IP (either IPv4 or IPv6). The VRF element 304 utilizes common IP/VPN (or MPLS/VPN) technology for transporting traffic on virtual private networks (VPNs). A VPN is a private data network that makes use of the public telecommunication infrastructure, and maintains privacy through the use of a tunneling protocol to separate the customers' networks. The controller 302 comprises computing technology such as a microprocessor, DSP (Digital Signal Processor) and associated mass storage media such as a disk drive, random access memory, flash memory, or other storage devices. The controller 302 can also be represented by a desktop computer, server or other processing device that can perform the operations disclosed herein.
  • The PW-IP/VPN PE router 300 is coupled to customer edge (CE) routers 310, a conventional an L2 access network 312, such as an ATM/FR network, and conventional L2-to-L3 PE routers 314. The function and operation of these components is illustrated in FIG. 4, which depicts a flowchart of a method 400 operating in the PW-IP/VPN PE router 300 according to the teachings of the present disclosure. Method 400 provides an overview of communications between first and second CE routers 310 each supporting one or more users with terminal equipment (e.g., desktop computer) coupled thereto.
  • Method 400 begins with step 401 where L3 packet traffic at terminal equipment of a customer is generated. This traffic can be as simple as a file transfer or more sophisticated functions such as video and/or voice over IP traffic. This traffic is generally destined for terminal equipment of another customer. In step 402, a first CE router 310 intercepts the traffic generated in step 401, and generates by conventional means a frame with an embedded L3 packet carrying a portion of said traffic. A frame is a packet defined by the second layer of the well-known OSI (Open Systems Interconnection) model. An L3 packet can be a packet that complies with standards such as the Multi-Protocol Label Switching (MPLS) or the Internet Protocol (IP). For illustration purposes only, the L3 packets will be referred to from hereon as IP packets.
  • In step 404, the first CE router 310 transmits the frame in the L2 access network 312, which in turn relays the frame to a select one of the conventional L2-L3 PE routers 314. The L2-L3 PE router 314 in step 406 receives the frame and embeds the frame in an IP packet. The IP packet is intercepted by the PW element 302 of the PW-IP/VPN PE router 300. The PW element 302 retrieves in step 408 the frame from the IP packet, and transmits it in step 410 to the VRF element 304.
  • The transmission step can be accomplished in step 409 by enabling a virtual circuit such as a physical and/or logical interface that interconnects the PW element 302 and the VRF element 304 (e.g., a physical signal bus and/or software bus). For any of these embodiments, the housing assembly 301 of the PW-VRF PE router 300 protects exchanges between the PW element 302 and the VRF element 304 from physical or other impairments (such as cross-talk), thus making it improbable that a single-point of failure such as described in the prior art systems of FIGS. 1 and 2 will occur. Said housing assembly 301 also eliminates the need for two extra L2 ports to connect L2 and L3 functions together as shown in the prior art system FIG. 2.
  • In step 412, the VRF element 412 retrieves the embedded IP packet from the frame. The VRF element 304 in step 414 embeds the retrieved IP packet in a new frame, which it transmits in step 416 to the second CE router 310. The CE router 310 in step 418 retrieves the embedded IP packet from the new frame, and transmits it to terminal equipment of a targeted customer coupled to the second CE router 310. In step 419 the IP packet is processed at the terminal equipment of the said customer.
  • The foregoing description traces a single packet from one customer to another targeted customer. It would be apparent to those of ordinary skill in the art that steps 401through 419 can be repeated for transporting packet traffic between customers. Additionally, said steps can be used for engaging in bidirectional communications in an IP/VPN connection or MPLS/VPN connection between customers coupled to the CE routers 310.
  • FIG. 5 is a diagrammatic representation of a machine in the form of a computer system 500 within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies discussed above. In some embodiments, the machine operates as a standalone device. In some embodiments, the machine may be connected (e.g., using a network) to other machines. In a networked deployment, the machine may operate in the capacity of a server or a client user machine in server-client user network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. The machine may comprise a server computer, a client user computer, a personal computer (PC), a tablet PC, a laptop computer, a desktop computer, a control system, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. It will be understood that a device of the present disclosure includes broadly any electronic device that provides voice, video or data communication. Further, while a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
  • The computer system 500 may include a processor 502 (e.g., a central processing unit (CPU), a graphics processing unit (GPU, or both), a main memory 504 and a static memory 506, which communicate with each other via a bus 508. The computer system 500 may further include a video display unit 510 (e.g., a liquid crystal display (LCD), a flat panel, a solid state display, or a cathode ray tube (CRT)). The computer system 500 may include an input device 512 (e.g., a keyboard), a cursor control device 514 (e.g., a mouse), a disk drive unit 516, a signal generation device 518 (e.g., a speaker or remote control) and a network interface device 520.
  • The disk drive unit 516 may include a machine-readable medium 522 on which is stored one or more sets of instructions (e.g., software 524) embodying any one or more of the methodologies or functions described herein, including those methods illustrated in herein above. The instructions 524 may also reside, completely or at least partially, within the main memory 504, the static memory 506, and/or within the processor 502 during execution thereof by the computer system 500. The main memory 504 and the processor 502 also may constitute machine-readable media. Dedicated hardware implementations including, but not limited to, application specific integrated circuits, programmable logic arrays and other hardware devices can likewise be constructed to implement the methods described herein. Applications that may include the apparatus and systems of various embodiments broadly include a variety of electronic and computer systems. Some embodiments implement functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit. Thus, the example system is applicable to software, firmware, and hardware implementations.
  • In accordance with various embodiments of the present disclosure, the methods described herein are intended for operation as software programs running on a computer processor. Furthermore, software implementations can include, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.
  • The present disclosure contemplates a machine readable medium containing instructions 524, or that which receives and executes instructions 524 from a propagated signal so that a device connected to a network environment 526 can send or receive voice, video or data, and to communicate over the network 526 using the instructions 524. The instructions 524 may further be transmitted or received over a network 526 via the network interface device 520.
  • While the machine-readable medium 522 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “machine-readable medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure.
  • The term “machine-readable medium” shall accordingly be taken to include, but not be limited to: solid-state memories such as a memory card or other package that houses one or more read-only (non-volatile) memories, random access memories, or other re-writable (volatile) memories; magneto-optical or optical medium such as a disk or tape; and carrier wave signals such as a signal embodying computer instructions in a transmission medium; and/or a digital file attachment to e-mail or other self-contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium. Accordingly, the disclosure is considered to include any one or more of a machine-readable medium or a distribution medium, as listed herein and including art-recognized equivalents and successor media, in which the software implementations herein are stored.
  • Although the present specification describes components and functions implemented in the embodiments with reference to particular standards and protocols, the disclosure is not limited to such standards and protocols. Each of the standards for Internet and other packet switched network transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) represent examples of the state of the art. Such standards are periodically superseded by faster or more efficient equivalents having essentially the same functions. Accordingly, replacement standards and protocols having the same functions are considered equivalents.
  • The illustrations of embodiments described herein are intended to provide a general understanding of the structure of various embodiments, and they are not intended to serve as a complete description of all the elements and features of apparatus and systems that might make use of the structures described herein. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description. Other embodiments may be utilized and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. Figures are merely representational and may not be drawn to scale. Certain proportions thereof may be exaggerated, while others may be minimized. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
  • Such embodiments of the inventive subject matter may be referred to herein, individually and/or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed. Thus, although specific embodiments have been illustrated and described herein, it should be appreciated that any arrangement calculated to achieve the same purpose may be substituted for the specific embodiments shown. This disclosure is intended to cover any and all adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent to those of skill in the art upon reviewing the above description.
  • The Abstract of the Disclosure is provided to comply with 37 C.F.R. §1.72(b), requiring an abstract that will allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.

Claims (20)

1. A Pseudo-Wire to Virtual Private Network Provider Edge (PW-VPN PE) router, comprising:
a pseudo-wire (PW) element;
a virtual routing and forwarding (VRF) element integrally coupled to the PW element; and
a controller for managing operations of the PW element and VRF element, and programmed to to:
receive a layer 3 (L3) packet comprising a frame and an embedded L3 packet; and
transmit to a targeted network element a new frame with the embedded L3 packet.
2. The PW- VPN PE router of claim 1, wherein the controller is programmed to:
cause the PW element to:
retrieve the frame from the L3 packet; and
transmit the frame on the integral connection to the VRF element;
cause the VRF element to:
retrieve the embedded L3 packet from the frame;
embed the L3 packet in the new frame; and
transmit the new frame to the targeted network element.
3. The PW-VPN PE router of claim 1, wherein the L3 packet is compliant with Internet Protocol (IP).
4. The PW- VPN PE router of claim 1, wherein the L3 packet is compliant with Multi-Protocol Label Switching (MPLS).
5. The PW-VPN PE router of claim 1, wherein the controller is programmed to exchange data in an IP/VPN connection between customer edge (CE) routers.
6. The PW-VPN PE router of claim 1, wherein the controller is programmed to exchange data an MPLS/VPN connection between CE routers.
7. The PW-VPN PE router of claim 1, comprising a housing assembly for carrying the components of the PW-VPN PE router, and wherein the integral connection comprises at least one among an unexposed physical interconnection and a logical interconnection between the PW element and the VRF element.
8. A computer-readable storage medium, comprising computer instructions for:
enabling an integral connection between a pseudo-wire (PW) element and a virtual routing and forwarding (VRF) element, wherein each of the PW element and VRF element has computer instructions for:
receiving an L3 packet comprising a frame and an embedded L3 packet; and
transmitting to a CE router a new frame with the embedded L3 packet.
9. The storage medium of claim 8, wherein the L3 packet is a packet compliant with the Internet Protocol (IP), and wherein the storage medium comprises computer instructions for:
retrieving the frame from the IP packet;
transmitting the frame on the integral connection to the VRF element;
retrieving the embedded IP packet from the frame;
embedding the IP packet in the new frame; and
transmitting the new frame to the CE router.
10. The storage medium of claim 8, wherein the L3 packet is a packet compliant with Multi-Protocol Label Switching (MPLS), and wherein the storage medium comprises computer instructions for:
retrieving the frame from the MPLS packet;
transmitting the frame on the integral connection to the VRF element;
retrieving the embedded MPLS packet from the frame;
embedding the MPLS packet in the new frame; and
transmitting the new frame to the CE router.
11. The storage medium of claim 8, comprising computer instructions for exchanging data in an IP/VPN (Virtual Private Network) connection between customer edge (CE) routers.
12. The storage medium of claim 8, comprising computer instructions for exchanging data in an MPLS/VPN connection between CE routers.
13. A method, comprising the steps of:
enabling an unexposed physical connection between a pseudo-wire (PW) element and a virtual routing and forwarding (VRF) element;
receiving at a pseudo-wire (PW) element from an L2 to L3 PE router an L3 packet comprising a frame and an embedded L3 packet from a first customer edge (CE) router; and
transmitting from the VRF element to a second CE router a new frame with the embedded L3 packet.
14. The method of claim 13, wherein the L3 packet is a packet compliant with the Internet Protocol (IP), and wherein the method comprises the steps of:
retrieving the frame from the IP packet;
transmitting the frame on the integral connection to the VRF element;
retrieving the embedded IP packet from the frame;
embedding the IP packet in the new frame; and
transmitting the new frame to the second CE router.
15. The method of claim 13, wherein the L3 packet is a packet compliant with Multi-Protocol Label Switching (MPLS), and wherein the method comprises the steps of:
retrieving the frame from the MPLS packet;
transmitting the frame on the integral connection to the VRF element;
retrieving the embedded MPLS packet from the frame;
embedding the MPLS packet in the new frame; and
transmitting the new frame to the second CE router.
16. The method of claim 13, comprising the step of exchanging data in an IP/VPN (Virtual Private Network) connection between the first and second CE routers.
17. The method of claim 13, comprising the step of exchanging data in an MPLS/VPN connection between the first and second CE routers.
18. A method, comprising the steps of:
generating an L3 packet at terminal equipment of a customer coupled to a first CE router;
generating a frame at the first CE router destined for a second CE router, wherein the frame embeds the L3 packet generated by the terminal equipment;
transmitting the frame in a L2 access network;
receiving the frame at an L2-to-L3 PE router;
generating at the L2-to-L3 PE router an L3 packet comprising the frame;
receiving the L3 packet at a PW-VPN PE router comprising a pseudo-wire (PW) element and a virtual routing and forwarding (VRF) element integrally coupled to each other by way of a virtual circuit;
transmitting from the PW-VPN PE router a new frame with the embedded L3 packet destined for the second CE router;
retrieving at the second CE router the embedded L3 packet from the new frame; and
transmitting from the second CE router the embedded L3 packet to terminal equipment of another customer coupled to the second CE router; and
processing the L3 packet at the terminal equipment of the other customer.
19. The method of claim 18, wherein the L3 packet is a packet compliant with the Internet Protocol (IP), and wherein the PW-VPN PE router the method comprises the steps of:
retrieving the frame from the IP packet;
transmitting the frame on the integral connection to the VRF element;
retrieving the embedded IP packet from the frame;
embedding the IP packet in the new frame; and
transmitting the new frame to the second CE router.
20. The method of claim 18, wherein the L3 packet is a packet compliant with Multi-Protocol Label Switching (MPLS), and wherein PW-VPN PE router the method comprises the steps of:
retrieving the frame from the MPLS packet;
transmitting the frame on the integral connection to the VRF element;
retrieving the embedded MPLS packet from the frame;
embedding the MPLS packet in the new frame; and
transmitting the new frame to the second CE router.
US11/252,098 2005-10-17 2005-10-17 Integrated pseudo-wire and virtual routing and forwarding on a single provider edge router Abandoned US20070086448A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/252,098 US20070086448A1 (en) 2005-10-17 2005-10-17 Integrated pseudo-wire and virtual routing and forwarding on a single provider edge router

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/252,098 US20070086448A1 (en) 2005-10-17 2005-10-17 Integrated pseudo-wire and virtual routing and forwarding on a single provider edge router

Publications (1)

Publication Number Publication Date
US20070086448A1 true US20070086448A1 (en) 2007-04-19

Family

ID=37948094

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/252,098 Abandoned US20070086448A1 (en) 2005-10-17 2005-10-17 Integrated pseudo-wire and virtual routing and forwarding on a single provider edge router

Country Status (1)

Country Link
US (1) US20070086448A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040037275A1 (en) * 2002-08-23 2004-02-26 Bing Li 3-Layer VPN and constructing method thereof
US20070076584A1 (en) * 2005-10-05 2007-04-05 Kim Jin P Method of processing traffic information and digital broadcast system
WO2009021371A1 (en) * 2007-08-13 2009-02-19 Zte Corporation A method and a device for implementing pseudo wire emulation edge to edge
US20090201831A1 (en) * 2008-02-07 2009-08-13 Cisco Technology, Inc. Vpls n-pe redundancy using pseudo wire fast failover
WO2010020126A1 (en) * 2008-08-19 2010-02-25 华为技术有限公司 Method, device and system for transmitting data in vpls network
US20100257435A1 (en) * 2005-10-05 2010-10-07 Jin Pil Kim Method of processing traffic information and digital broadcast system
CN102055647A (en) * 2009-11-03 2011-05-11 中兴通讯股份有限公司 Three-layer virtual private network (VPN) access method and system
CN101719857B (en) * 2009-12-16 2012-01-11 中兴通讯股份有限公司 Asymmetric PW-based VPLS network access method and asymmetric PW-based VPLS network access system
US8369345B1 (en) * 2009-11-13 2013-02-05 Juniper Networks, Inc. Multi-router system having shared network interfaces
US20130058255A1 (en) * 2010-07-06 2013-03-07 Martin Casado Managed switch architectures: software managed switches, hardware managed switches, and heterogeneous managed switches
CN103634215A (en) * 2013-12-17 2014-03-12 中国联合网络通信集团有限公司 Method and device for MAC (media access control) address synchronization
CN104243264A (en) * 2014-09-03 2014-12-24 烽火通信科技股份有限公司 System and method for connecting PW to L3VPN through N:1 model
CN105429841A (en) * 2014-09-15 2016-03-23 中兴通讯股份有限公司 NNI PING realization method and device
CN105939262A (en) * 2016-05-09 2016-09-14 杭州迪普科技有限公司 Label allocation method and device
US9485149B1 (en) 2004-01-06 2016-11-01 Juniper Networks, Inc. Routing device having multiple logical routers
US9596167B1 (en) * 2015-04-24 2017-03-14 Juniper Networks, Inc. Internet protocol virtual private network service performance monitoring
US9680750B2 (en) 2010-07-06 2017-06-13 Nicira, Inc. Use of tunnels to hide network addresses
US9769044B1 (en) 2014-09-29 2017-09-19 Juniper Networks, Inc. Internet protocol service performance monitoring
US9769091B2 (en) * 2012-06-28 2017-09-19 Huawei Technologies Co., Ltd. Method and system for reducing packet loss in a service protection scheme

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040081172A1 (en) * 2002-09-13 2004-04-29 Hamid Ould-Brahim Generalized Layer-2 VPNs
US20040156313A1 (en) * 2003-02-03 2004-08-12 Hofmeister Ralph Theodore Method and apparatus for performing data flow ingress/egress admission control in a provider network
US20040170173A1 (en) * 2003-01-15 2004-09-02 Ping Pan Method and apparatus for transporting packet data over an optical network
US20040202199A1 (en) * 2003-04-11 2004-10-14 Alcatel Address resolution in IP interworking layer 2 point-to-point connections
US20050190757A1 (en) * 2004-02-27 2005-09-01 Cisco Technology Inc. Interworking between Ethernet and non-Ethernet customer sites for VPLS
US20060090008A1 (en) * 2004-10-21 2006-04-27 Jim Guichard Pseudowire termination directly on a router
US20080016275A1 (en) * 2003-01-13 2008-01-17 Donia Sebastian Allocation-unit-based virtual formatting methods and devices employing allocation-unit-based virtual formatting methods
US20080144632A1 (en) * 2004-04-20 2008-06-19 Nortel Networks Limited Method and System For Quality of Service Support For Ethernet Multiservice Interworking Over Multiprotocol Lable Switching

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040081172A1 (en) * 2002-09-13 2004-04-29 Hamid Ould-Brahim Generalized Layer-2 VPNs
US20080016275A1 (en) * 2003-01-13 2008-01-17 Donia Sebastian Allocation-unit-based virtual formatting methods and devices employing allocation-unit-based virtual formatting methods
US20040170173A1 (en) * 2003-01-15 2004-09-02 Ping Pan Method and apparatus for transporting packet data over an optical network
US20040156313A1 (en) * 2003-02-03 2004-08-12 Hofmeister Ralph Theodore Method and apparatus for performing data flow ingress/egress admission control in a provider network
US20040202199A1 (en) * 2003-04-11 2004-10-14 Alcatel Address resolution in IP interworking layer 2 point-to-point connections
US20050190757A1 (en) * 2004-02-27 2005-09-01 Cisco Technology Inc. Interworking between Ethernet and non-Ethernet customer sites for VPLS
US20080144632A1 (en) * 2004-04-20 2008-06-19 Nortel Networks Limited Method and System For Quality of Service Support For Ethernet Multiservice Interworking Over Multiprotocol Lable Switching
US20060090008A1 (en) * 2004-10-21 2006-04-27 Jim Guichard Pseudowire termination directly on a router

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040037275A1 (en) * 2002-08-23 2004-02-26 Bing Li 3-Layer VPN and constructing method thereof
US7411955B2 (en) * 2002-08-23 2008-08-12 Huawei Technologies Co., Ltd. 3-layer VPN and constructing method thereof
US9485149B1 (en) 2004-01-06 2016-11-01 Juniper Networks, Inc. Routing device having multiple logical routers
US9832099B1 (en) 2004-01-06 2017-11-28 Juniper Networks, Inc. Routing device having multiple logical routers
US20100325518A1 (en) * 2005-10-05 2010-12-23 Jin Pil Kim Method of processing traffic information and digital broadcast system
US7840868B2 (en) 2005-10-05 2010-11-23 Lg Electronics Inc. Method of processing traffic information and digital broadcast system
US20100229213A1 (en) * 2005-10-05 2010-09-09 Jin Pil Kim Method of processing traffic information and digital broadcast system
US20100232341A1 (en) * 2005-10-05 2010-09-16 Jin Pil Kim Method of processing traffic information and digital broadcast system
US20100232456A1 (en) * 2005-10-05 2010-09-16 Jin Pil Kim Method of processing traffic information and digital broadcast system
US7804860B2 (en) 2005-10-05 2010-09-28 Lg Electronics Inc. Method of processing traffic information and digital broadcast system
US20100257435A1 (en) * 2005-10-05 2010-10-07 Jin Pil Kim Method of processing traffic information and digital broadcast system
US20070076584A1 (en) * 2005-10-05 2007-04-05 Kim Jin P Method of processing traffic information and digital broadcast system
US8018977B2 (en) 2005-10-05 2011-09-13 Lg Electronics Inc. Method of processing traffic information and digital broadcast system
WO2009021371A1 (en) * 2007-08-13 2009-02-19 Zte Corporation A method and a device for implementing pseudo wire emulation edge to edge
US20090201831A1 (en) * 2008-02-07 2009-08-13 Cisco Technology, Inc. Vpls n-pe redundancy using pseudo wire fast failover
US8107386B2 (en) * 2008-02-07 2012-01-31 Cisco Technology, Inc. VPLS N-PE redundancy using pseudo wire fast failover
WO2010020126A1 (en) * 2008-08-19 2010-02-25 华为技术有限公司 Method, device and system for transmitting data in vpls network
CN102055647A (en) * 2009-11-03 2011-05-11 中兴通讯股份有限公司 Three-layer virtual private network (VPN) access method and system
WO2011054263A1 (en) * 2009-11-03 2011-05-12 中兴通讯股份有限公司 Access method and access system for layer 3 virtual private networks(vpn)
US8369345B1 (en) * 2009-11-13 2013-02-05 Juniper Networks, Inc. Multi-router system having shared network interfaces
US9444768B1 (en) 2009-11-13 2016-09-13 Juniper Networks, Inc. Multi-router system having shared network interfaces
CN101719857B (en) * 2009-12-16 2012-01-11 中兴通讯股份有限公司 Asymmetric PW-based VPLS network access method and asymmetric PW-based VPLS network access system
US10038597B2 (en) 2010-07-06 2018-07-31 Nicira, Inc. Mesh architectures for managed switching elements
US9306875B2 (en) * 2010-07-06 2016-04-05 Nicira, Inc. Managed switch architectures for implementing logical datapath sets
US11743123B2 (en) 2010-07-06 2023-08-29 Nicira, Inc. Managed switch architectures: software managed switches, hardware managed switches, and heterogeneous managed switches
US11641321B2 (en) 2010-07-06 2023-05-02 Nicira, Inc. Packet processing for logical datapath sets
US10686663B2 (en) 2010-07-06 2020-06-16 Nicira, Inc. Managed switch architectures: software managed switches, hardware managed switches, and heterogeneous managed switches
US10021019B2 (en) 2010-07-06 2018-07-10 Nicira, Inc. Packet processing for logical datapath sets
US9692655B2 (en) 2010-07-06 2017-06-27 Nicira, Inc. Packet processing in a network with hierarchical managed switching elements
US20130058255A1 (en) * 2010-07-06 2013-03-07 Martin Casado Managed switch architectures: software managed switches, hardware managed switches, and heterogeneous managed switches
US9680750B2 (en) 2010-07-06 2017-06-13 Nicira, Inc. Use of tunnels to hide network addresses
US9769091B2 (en) * 2012-06-28 2017-09-19 Huawei Technologies Co., Ltd. Method and system for reducing packet loss in a service protection scheme
CN103634215A (en) * 2013-12-17 2014-03-12 中国联合网络通信集团有限公司 Method and device for MAC (media access control) address synchronization
CN104243264A (en) * 2014-09-03 2014-12-24 烽火通信科技股份有限公司 System and method for connecting PW to L3VPN through N:1 model
CN105429841A (en) * 2014-09-15 2016-03-23 中兴通讯股份有限公司 NNI PING realization method and device
US9769044B1 (en) 2014-09-29 2017-09-19 Juniper Networks, Inc. Internet protocol service performance monitoring
US9596167B1 (en) * 2015-04-24 2017-03-14 Juniper Networks, Inc. Internet protocol virtual private network service performance monitoring
CN105939262A (en) * 2016-05-09 2016-09-14 杭州迪普科技有限公司 Label allocation method and device

Similar Documents

Publication Publication Date Title
US20070086448A1 (en) Integrated pseudo-wire and virtual routing and forwarding on a single provider edge router
USRE46195E1 (en) Multipath transmission control protocol proxy
US7852789B2 (en) Methods, systems, and/or devices for providing network access
US7782841B2 (en) Method and system for transporting data using pseudowire circuits over a bridged network
US7756125B2 (en) Method and arrangement for routing pseudo-wire encapsulated packets
US7899061B2 (en) Access device and service transmission method
EP1766876B1 (en) Technique for transferring data over a packet switched network
US7707277B2 (en) Method and system for configuring pseudowires using dynamic host configuration protocol (DHCP) messages
US20100111091A1 (en) Method and apparatus to perform network routing
US20050232263A1 (en) Communication control apparatus, communication network and method of updating packet transfer control information
US20090016361A1 (en) System and method for establishing communications between packet-switched networks
CN112583718B (en) SRv6 message transmission method, system, equipment and medium in SRoU scene
US20080291920A1 (en) System and method for managing communications
US7088737B1 (en) Method and apparatus for combining packets having different protocol encapsulations within a circuit
Lewis et al. Selecting Mpls Vpn Services
EP1445896A1 (en) Provider connection system, packet exchange apparatus thereof, dns server, packet exchange method, and computer program thereof
US20040258056A1 (en) Provider connection system, packet exchange apparatus thereof, dns server, packet exchange method, and computer program thereof
JP5853758B2 (en) Communication apparatus and bandwidth control method
US20070064678A1 (en) Method and system for monitoring communications of an individual in a packet network
US20230140789A1 (en) Robust network connectivity leveraging edge compute
Held Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security
CN115065734A (en) Data processing method, device and chip
Shelly et al. Fault-tolerant overlay protocol network
Waschke Network and Internet Standards: Connecting the Dots
SECTOR TD 1111 Rev. 1 TELECOMMUNICATION

Legal Events

Date Code Title Description
AS Assignment

Owner name: SBC KNOWLEDGE VENTURES, L.P., NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HU, CHENG-HONG;REEL/FRAME:017123/0078

Effective date: 20051014

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION